libseccomp2-2.5.3-150300.10.8.1<>,Hb&8p9|$Hsru*K ȑɨ7|~;P.BCl ԦH)Nؖ:ٞx6xE!)_u-#XH/mxG`*EшF @Ʉb)4=6\NIHc׵~b14-];7b豼0l adΘr,V,> @-R5v2IZlMD'\-] 0͒s<T/f@w؀\3#ʉӅb9<>?L S[z>@(?(d " NTX`d}    ( 8   4D   (8!9D!:!>$@%F%G%,H%<I%LX%PY%\\%]%^%b&c&d'@e'Ef'Hl'Ju'\v'lw(x( y(0z(D(T(X(^(Clibseccomp22.5.3150300.10.8.1An enhanced Seccomp (mode 2) helper libraryThe libseccomp library provides an interface to the Linux Kernel's syscall filtering mechanism, seccomp. The libseccomp API abstracts away the underlying BPF-based syscall filter language and presents a more conventional function-call based filtering interface.b&8sheep96HSUSE Linux Enterprise 15SUSE LLC LGPL-2.1-onlyhttps://www.suse.com/System/Librarieshttps://github.com/seccomp/libseccomplinuxx86_64_lA큤b&4;b&4 key.- Update to release 2.4.3 * Add list of authorized release signatures to README.md * Fix multiplexing issue with s390/s390x shm* syscalls * Remove the static flag from libseccomp tools compilation * Add define for __SNR_ppoll * Fix potential memory leak identified by clang in the scmp_bpf_sim tool - Drop no-static.diff, libseccomp-fix_aarch64-test.patch, SNR_ppoll.patch (merged)- Add patch to fix ntpsec and others build (accidental drop of symbols): * SNR_ppoll.patch- Tests are passing on all architectures- Backport patch to fix test on aarch64: * libseccomp-fix_aarch64-test.patch- Update to release 2.4.2 * Add support for io-uring related system calls- ignore make check error for ppc64/ppc64le, bypass boo#1142614- Update to new upstream release 2.4.1 * Fix a BPF generation bug where the optimizer mistakenly identified duplicate BPF code blocks.- updated to 2.4.0 (bsc#1128828 CVE-2019-9893) - Update the syscall table for Linux v5.0-rc5 - Added support for the SCMP_ACT_KILL_PROCESS action - Added support for the SCMP_ACT_LOG action and SCMP_FLTATR_CTL_LOG attribute - Added explicit 32-bit (SCMP_AX_32(...)) and 64-bit (SCMP_AX_64(...)) argument comparison macros to help protect against unexpected sign extension - Added support for the parisc and parisc64 architectures - Added the ability to query and set the libseccomp API level via seccomp_api_get(3) and seccomp_api_set(3) - Return -EDOM on an endian mismatch when adding an architecture to a filter - Renumber the pseudo syscall number for subpage_prot() so it no longer conflicts with spu_run() - Fix PFC generation when a syscall is prioritized, but no rule exists - Numerous fixes to the seccomp-bpf filter generation code - Switch our internal hashing function to jhash/Lookup3 to MurmurHash3 - Numerous tests added to the included test suite, coverage now at ~92% - Update our Travis CI configuration to use Ubuntu 16.04 - Numerous documentation fixes and updates - now gpg signed, added key of Paul Moore from keyserver.- Use %license instead of %doc [bsc#1082318]- Update to release 2.3.3: * Updated the syscall table for Linux v4.15-rc7- Unconditionally rerun autoreconf because of patches- Update to release 2.3.2: * Achieved full compliance with the CII Best Practices program * Added Travis CI builds to the GitHub repository * Added code coverage reporting with the "--enable-code-coverage" configure flag and added Coveralls to the GitHub repository * Updated the syscall tables to match Linux v4.10-rc6+ * Support for building with Python v3.x * Allow rules with the -1 syscall if the SCMP\_FLTATR\_API\_TSKIP attribute is set to true * Several small documentation fixes - Remove service file as we are not based on git- Update to new upstream release 2.3.1 * arch: fix the multiplexed ipc() syscalls * s390: handle multiplexed syscalls correctly - Remove 0001-arch-fix-a-number-of-32-bit-x86-failures-related-to-.patch, 0001-tests-replace-socket-syscall-references-in-15-basic-.patch (fixed upstream)- Add 0001-tests-replace-socket-syscall-references-in-15-basic-.patch- Add 0001-arch-fix-a-number-of-32-bit-x86-failures-related-to-.patch- updated to final 2.3.0 release - builderror-k316.diff: fixed upstream - i586 testsuite fails, disable for now- Update to git snapshot 2.3.0~g96 * have libseccomp build with newer linux-glibc-devel; "multiplexed and direct socket syscalls" - Drop libseccomp-s390x-support.patch, libseccomp-ppc64le.patch (no longer apply - merged upstream) - Add builderror-k316.diff- Add baselibs.conf: systemd-32bit-224+ links against libseccomp.so.2.- Update to new upstream release 2.2.3 * Fix a problem with the masked equality operator * Fix a problem on x86_64/x32 involving invalid architectures * Fix a problem with the ARM specific syscalls- Update to new upstream release 2.2.1 * Fix a problem with syscall argument filtering on 64-bit systems * Fix some problems with the 32-bit ARM syscall table - Drop 0001-tools-add-the-missing-elf.h-header-file.patch, libseccomp-arm-syscall-fixes.patch (applied upstream)- Fix ppc64le build: libseccomp-ppc64le.patch- Fix some arm syscall constants libseccomp-arm-syscall-fixes.patch- Update to new upstream release 2.2.0 * Added support for aarch64, mips, mips64, mips64n32 (BE/LE). * Added support for using the new seccomp() syscall and the thread sync functionality. * Added Python bindings - Remove 0001-build-use-autotools-as-build-system.patch (merged). Add no-static.diff. Add 0001-tools-add-the-missing-elf.h-header-file.patch/sbin/ldconfig/sbin/ldconfigsheep96 16466718952.5.3-150300.10.8.12.5.3-150300.10.8.1libseccomp.so.2libseccomp.so.2.5.3libseccomp2LICENSE/usr/lib64//usr/share/licenses//usr/share/licenses/libseccomp2/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:23188/SUSE_SLE-15-SP3_Update/218ca872f6b301372a0d2fb2660e4ba4-libseccomp.SUSE_SLE-15-SP3_Updatedrpmxz5x86_64-suse-linuxELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, BuildID[sha1]=b333d6c9831435540f422df996f9e46292a1d5cc, strippeddirectoryASCII textPRRRR^ p3dG#֟%utf-83d9052f17bda433fffe16a32c440a3d35c48238f7565b24c97fde45f9b0583ae?7zXZ !t/4^]"k%]dU)^kc4ױ ׌>B[z5m_-TA&hT`dmM5XR("e SWu# TQ9'ۃPC :T T|TP–kғO ,OI^#u=cCc6P*ߜl+ZXh?]>M>PP /8%`pߙ˲U|{Z?a;~rW'͓X$ Xbq2G~8LEdaiۖRcWdLhq({ srZ; AwG4'r%i52e'n@d\3x pW~z%JFSwIF8 C1~L<\$jFqD܅Wr r5z dR3`%؈T*d_[|VT5d MZ>b Y)}xqkvnVt@ל:˜FV~2O:F\B[%`tq˛#ײɡ1tN[uލ&a sֺ3;0M؂@ %ӂCr6ޅEijܜG^# HY+fU݂*dD= y ϛ';m#Q BpU3κ H$ ?yi=;Qh~Z:V:ϾV$>_t3Gɗ^Puˇ灴1f9FE([ɪXNw)(I\JzDF-ʰfnȨ~T8(Ti GvGJË;g? ֤+u/p ,U3H 57RJbsb[ 6)@vLgx8G3)n)e+ ·bB+9nȞЗ }%,l#Y":V8dCw- 4d)Bu_Љ:XG]&*jT0iDhi4 5+<EPZ *_cKfedx۸p2$y}9Kko~Q/Oꎙ`=dIv6+3P8l19| /;J}5Fgr: e‡8j=&D 32`2EŃ!ٯZhE(, 9;ƒvSivE&Ĺ*GnTQ0bWwU2BiAr!R8kWȔv)sn~#Oz܁J 8͆5#ʅOwC;\#˒EAA4 >f9&.]NO$?& 0$X7th7:?S=aX>SBw%ڜcͨr܊2';".41jt}JSşcU;{{'l5wtJ_ˍTf *Aid7NYQA |E@/vbOaVIcBܙӿg6\[I$A߇Y#Ketao-=#KI&j: {Yz{=u050i;M -L~v_& Xv邸:R啊L23\Z4n}a+Q `ErnplX ծ^~GE)U,'ĻũYf*m("|@mDWJ5z_$2,/-9,@+QCYPը^oZ"/R'c~#<1!2 m ̫][ 7 ;\2jCwo Ui?DŽFŒtq%Bˏs%SIcGP,([ø[IߪzlގkX'>B;eF E)"Ș[/[l0CC4!L 6c^!]_o]&7!`ռa>[3p&^AXFѻg.z]֑t‹v"9R9i\E'k8"O8=5+fڗ oY c&!ڋc $Դap>4R)+{9yLߙt :̡J9Lw Ac@O+7.3xZ:a|PiZ9d" c$,EQ5+&&L簫V2y-VGr87@?6Ȯ=B'իU4q%}C$ab38`?#@{SU1u*Up׬& UN<,5?*e:x4q,Y=)%K| #>7 L&> XozWӣ:QqE3 C^u-MƤǬDPhӛDLDFOGчj&[WnX16p&7jI'¯F1"’<-/SX/Ts+0Ӷ aXpQC nH7'.iJ˥]]lcNtÆdw!4μM3& j6;Z=(!ɜE)z79Q$ Yӂn9$O![-SޞkψInim?YLD,1 }:H9@+q{ }bۜ&~=36i˗NޓYo1w%-/9o+dMa;Ym6FfO1w  8B%D;.̎kvóRܨ:'M4zk_);CG%K5ٛN>5h[TY#@+;! TV *,-3߻v"n\NMSHD6}8bLpXaLf2G G tB  Y{.UDa,,]#)_1~?bPkNg|.QIErNtcb5dPA/Y+_f0\- e.o"%{w:'r ʯd!oo\ MxRX'yȕhd ӻf6jz}ExLlW:%$Jl%_a rJ9sdC]!ߌUt舍RD KUJ Nm2 õYB5ɇx૨d$yPbcx%GEz~ht.:Kr#a[G d] )eLͦF;Ɍ_9׭ ^Embqe|0 zC}O! 58B'2X]3&BS+̒?45jopJ=t}o&ՋiV:e-e j[/\d-Wښ6Hf?G/u>  Y8 ~+ScQt=5|9.cYh CYtF*݀CΐV_K)^d&*_rœHmOkC Bh߻4́cpmЈOA+?ï,9"U, R}D29GY i8D>5*&*8_םGT[I'W,/)rBr^HX:` w@-H 3+aD#׹S=ov0j71z{2ÓSgȹ<:<6a!22KL xAEEnPH!; xMFӖP"LG-+(+sq\~flёہ؄<\dE 0~W@"ձ*+Z;U]FErfem?#%̸_2N&6"^